Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 01:14
Static task
static1
Behavioral task
behavioral1
Sample
49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe
Resource
win7-20240903-en
General
-
Target
49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe
-
Size
770KB
-
MD5
2dcd12a2792c0f2cb39ecd4c7e20ab4f
-
SHA1
d5fc868e09452d93f513620bf597daceed71f3ee
-
SHA256
49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65
-
SHA512
de7e706e6cdb87b018d6436abb2fd44f1a496de9c914fcbd8aa722bb04123c627aab905c125f8ee7a4d95fe029598b1d34f232b72dc26b3831cf98f0ccfba292
-
SSDEEP
12288:w1ZF8Kmih8yenE8TL9XnbHBPSrwLokrRWh1Y8CRLfvTWsuXPRZtdAiMuL3TeB:wylihWhX9nV60skr+vCRLfLUXdd6uY
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.fosna.net - Port:
21 - Username:
[email protected] - Password:
(=8fPSH$KO_!
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2668 powershell.exe 2656 powershell.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2808 set thread context of 2532 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2688 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 2532 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 2532 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 2668 powershell.exe 2656 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe Token: SeDebugPrivilege 2532 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe Token: SeDebugPrivilege 2668 powershell.exe Token: SeDebugPrivilege 2656 powershell.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2668 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 30 PID 2808 wrote to memory of 2668 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 30 PID 2808 wrote to memory of 2668 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 30 PID 2808 wrote to memory of 2668 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 30 PID 2808 wrote to memory of 2656 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 32 PID 2808 wrote to memory of 2656 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 32 PID 2808 wrote to memory of 2656 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 32 PID 2808 wrote to memory of 2656 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 32 PID 2808 wrote to memory of 2688 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 33 PID 2808 wrote to memory of 2688 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 33 PID 2808 wrote to memory of 2688 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 33 PID 2808 wrote to memory of 2688 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 33 PID 2808 wrote to memory of 2528 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 36 PID 2808 wrote to memory of 2528 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 36 PID 2808 wrote to memory of 2528 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 36 PID 2808 wrote to memory of 2528 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 36 PID 2808 wrote to memory of 2532 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 37 PID 2808 wrote to memory of 2532 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 37 PID 2808 wrote to memory of 2532 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 37 PID 2808 wrote to memory of 2532 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 37 PID 2808 wrote to memory of 2532 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 37 PID 2808 wrote to memory of 2532 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 37 PID 2808 wrote to memory of 2532 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 37 PID 2808 wrote to memory of 2532 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 37 PID 2808 wrote to memory of 2532 2808 49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe"C:\Users\Admin\AppData\Local\Temp\49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\EedSBllZi.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EedSBllZi" /XML "C:\Users\Admin\AppData\Local\Temp\tmp258A.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe"C:\Users\Admin\AppData\Local\Temp\49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe"2⤵PID:2528
-
-
C:\Users\Admin\AppData\Local\Temp\49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe"C:\Users\Admin\AppData\Local\Temp\49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD504dda14ed62e0d0fea604001ae2f303e
SHA19204fe63b52476d2792856689425f37ba47d67ee
SHA25644eb17ff3929d2b86805c0148a55fb45f6bb59b228ab0de1cbad23ab023e62af
SHA512c6e6ea35c81c3fa34c28bc6fdc1b9bac5120ff8d62e0bff8d124136ee23b2edbb61ef0b24174c67c7549d2491cb301d69d8f695fb31d8056cc93fbb45db4cd8c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD55d6684875a57839cf778c1f3fc8632ea
SHA110929692b17e037da1021d8e896f77f0bd640575
SHA25613f4bc7c6bdea351b2959019c5c87e8768540bddbc08dc30d73f5b0afe442251
SHA512a5e2ad1754384ffaea96816d05fa8989a315ef0a7b5e67feef74cc24eb12d22846d38bbd9e4d990de5aba46e4c9b3e22cef072321fc04c3fa0f7bca96eacbc6b